GHSA-P75C-5X3H-CXCG

Vulnerability from github – Published: 2022-10-07 21:19 – Updated: 2022-10-07 21:19
VLAI?
Summary
Fat Free CRM vulnerable to Remote Denial of Service via Tasks endpoint
Details

Impact

An authenticated user can perform a remote Denial of Service attack against Fat Free CRM.

This vulnerability has been assigned the CVE identifier: CVE-2022-39281

Affected versions: All Not affected: None Fixed versions: 0.20.1

All users running an affected release should either upgrade or apply the patch immediately.

Releases

Fixed versions: 0.20.1 and above

Patches

If you are unable to upgrade immediately, you should apply the following patch.

diff --git a/app/models/polymorphic/task.rb b/app/models/polymorphic/task.rb
index d3d5c32c..7cdb24d6 100644
--- a/app/models/polymorphic/task.rb
+++ b/app/models/polymorphic/task.rb
@@ -189,6 +189,7 @@ class Task < ActiveRecord::Base
   #----------------------------------------------------------------------------
   def self.bucket_empty?(bucket, user, view = "pending")
     return false if bucket.blank? || !ALLOWED_VIEWS.include?(view)
+    return false unless Setting.task_bucket.map(&:to_s).include?(bucket.to_s)

     if view == "assigned"
       assigned_by(user).send(bucket).pending.count

Credits

Thanks to @p- for reporting this and working with us to responsibly disclose this vulnerability.

Further information

If you have any questions or comments about this advisory, please Open an issue in GitHub Issue Tracker

Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "RubyGems",
        "name": "fat_free_crm"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0.20.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2022-39281"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-20"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2022-10-07T21:19:01Z",
    "nvd_published_at": "2022-10-08T01:15:00Z",
    "severity": "MODERATE"
  },
  "details": "### Impact\nAn authenticated user can perform a remote Denial of Service attack against Fat Free CRM.\n\nThis vulnerability has been assigned the CVE identifier: CVE-2022-39281\n\nAffected versions: All\nNot affected: None\nFixed versions: 0.20.1\n\nAll users running an affected release should either upgrade or apply the patch immediately.\n\n### Releases\nFixed versions: 0.20.1 and above\n\n### Patches\n\nIf you are unable to upgrade immediately, you should apply the following patch.\n\n```\ndiff --git a/app/models/polymorphic/task.rb b/app/models/polymorphic/task.rb\nindex d3d5c32c..7cdb24d6 100644\n--- a/app/models/polymorphic/task.rb\n+++ b/app/models/polymorphic/task.rb\n@@ -189,6 +189,7 @@ class Task \u003c ActiveRecord::Base\n   #----------------------------------------------------------------------------\n   def self.bucket_empty?(bucket, user, view = \"pending\")\n     return false if bucket.blank? || !ALLOWED_VIEWS.include?(view)\n+    return false unless Setting.task_bucket.map(\u0026:to_s).include?(bucket.to_s)\n\n     if view == \"assigned\"\n       assigned_by(user).send(bucket).pending.count\n```\n\n### Credits\n\nThanks to @p- for reporting this and working with us to responsibly disclose this vulnerability.\n\n### Further information\nIf you have any questions or comments about this advisory, please Open an issue in [GitHub Issue Tracker](https://github.com/fatfreecrm/fat_free_crm/issues)\n\n",
  "id": "GHSA-p75c-5x3h-cxcg",
  "modified": "2022-10-07T21:19:01Z",
  "published": "2022-10-07T21:19:01Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/fatfreecrm/fat_free_crm/security/advisories/GHSA-p75c-5x3h-cxcg"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39281"
    },
    {
      "type": "WEB",
      "url": "https://github.com/fatfreecrm/fat_free_crm/commit/c85a2546348c2692d32f952c753f7f0b43d1ca71"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/fatfreecrm/fat_free_crm"
    },
    {
      "type": "WEB",
      "url": "https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.20.1"
    },
    {
      "type": "WEB",
      "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fat_free_crm/CVE-2022-39281.yml"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ],
  "summary": "Fat Free CRM vulnerable to Remote Denial of Service via Tasks endpoint"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…